Hi all,

I used the following command to view the virtual address translation process.

  build/X86/gem5.opt --debug-flags=Exec,TLB 
--debug-file=/home/liyan/Desktop/gem5/m5out/debug.txt configs/example/se.py 
--cpu-type=TimingSimpleCPU --caches --l2cache --mem-type=DRAMsim3 --num-cpus=1 
-c "tests/test-progs/hello/bin/x86/linux/hello" 

However, I found some strange virtual address such as 0x7fffffffee20

  56500: system.cpu.dtb: Translating vaddr 0x7fffffffee20.
  56500: system.cpu.dtb: In protected mode.
  56500: system.cpu.dtb: Paging enabled.
  56500: system.cpu.dtb: Handling a TLB miss for address 0x7fffffffee20 at pc 
0x400a55.
  56500: system.cpu.dtb: Mapping 0x7fffffffe000 to 0xbd000
  56500: system.cpu.dtb: Miss was serviced.
  56500: system.cpu.dtb: Entry found with paddr 0xbd000, doing protection 
checks.
  56500: system.cpu.dtb: Translated 0x7fffffffee20 -> 0xbde20.

And it(0x7fffffffee20) also appears here(I don't know whether there is any 
relationship)

  56500: system.cpu T0 : @_start+5    : pop     rsi                   
  56500: system.cpu T0 : @_start+5.0  :   POP_R : ldis   t1, SS:[rsp] : MemRead 
:  D=0x0000000000000001 A=0x7fffffffee20
 110500: system.cpu T0 : @_start+5.1  :   POP_R : addi   rsp, rsp, 0x8 : IntAlu 
:  D=0x00007fffffffee28
 110500: system.cpu T0 : @_start+5.2  :   POP_R : mov   rsi, rsi, t1 : IntAlu : 
 D=0x0000000000000001

Then I used following command to check the address in hello.dump file but 
didn't find such address.

  objdump -D hello > hello.dump

I'm not familiar with the compilation process and work flow of the core. Does 
anyone know why these address exist?

Any ideas are appreciated! Please reply if you have some advice. Thanks in 
advance!

Liyan Chen
_______________________________________________
gem5-users mailing list -- gem5-users@gem5.org
To unsubscribe send an email to gem5-users-le...@gem5.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s

Reply via email to